All Issue

2021 Vol.9, Issue 4

Research Article

31 December 2021. pp. 1-11
Abstract
급변하는 기술의 발전과 더불어 모바일 장치는 단순하게 제공되는 일상의 정보 제공의 기능을 넘어 여러 특정 분야에서 활발하게 사용되고 있으며 이는 이제 개인의 정보 보호 및 인증 이상의 아주 중요한 역할을 하고 있다. 이로 말미암아 모바일 장치의 사용자 인증 수단은 다각 도로 연구되고 실용화되고 있으며 다양하게 변화하고 발전하고 있다. 최근에는 바이오 매트릭스 기반의 인증으로 기존의 지식 기반 인증 방식인 패스워드, 패턴락 보다 편리하고 안전한 방법으로 각광 받고 있으나 여전히 취약점이 따른다. 본 연구에서는 먼저 사용자 인증 방법의 분류 및 사회 공학 공격유형에 대해 분석하고 기존 인증 기법과 생체 인식 인증의 문제점에 대하여 논한다. 이후 각 인증 기법의 효율적인 방법을 고려하여 기존 패턴 기반 인증에서 사회 공학 공격의 안전성을 위해 패턴을 이미지화하고 랜덤화 하여 사용자가 선택한 이미지 순서에 의거 이를 인증값으로 사용한다. 또한 보안 등급을 높이기 위해 생체 인식의 하나인 지문 인식을 추가하여 사용자 인증 방법의 지식 기반 인증과 생체기반 인증을 혼용하여 새로운 형태의 융복합의 강한 인증 기법을 제안한다.
In the rapidly changing technology development, mobile devices are being actively used in a number of specific fields beyond simply providing daily information, which now plays a very important role beyond personal information protection and authentication. Due to this, the user authentication means of the mobile device is being studied and put to practical use from various angles, and is being changed and developed in various ways. In recent years, biomatrix-based authentication has been in the spotlight as a more convenient and safer method than existing knowledge-based authentication methods such as passwords and pattern locks, but it still has vulnerabilities. In this study, first, the classification of user authentication methods is investigated, the social engineering attack type is analyzed, and the existing authentication techniques and the problems of biometric authentication are discussed. After that, considering the efficient method of each authentication method, the pattern is imaged and randomized for the safety of social engineering attacks in the existing pattern-based authentication, and this is used as the authentication value based on the image sequence selected by the user. In addition, fingerprint recognition, one of biometrics, is added to increase the security level, and a new type of convergence strong authentication method is proposed by mixing knowledge-based authentication and biometric-based authentication of user authentication methods.
References
  1. D. Lee, D. Bae, S. You, J. Chae, Y. Lee, and H. Yang, "An Analysis on the Security of Secure Keypads for SmartPhone", Review of KIISC (Korea Institute of Information Security and Cryptology), Vol. 21, No. 7, pp. 30-37, November 2011.
  2. Y. Lee, "An Analysis on the Vulnerability of Secure Keypads for Mobile Devices", Journal of Internet Computing and Services, Vol. 14, No. 3, pp. 15-21, June 2013.https://doi.org/10.7472/jksii.2013.14.3.15
  3. D. Choi, C. Baek, and I. Chung, "Virtual Keyboard Against Social Engineering Attacks in Smartphones", Journal of Korea Multimedia Society, Vol. 18, No. 3, pp. 386-375, March 2015.https://doi.org/10.9717/kmms.2015.18.3.368
  4. H. Sun, S. Chen, J. Yeh, and C. Cheng, "A Shoulder Surfing Resistant Graphical Authentication System", IEEE Transactions on Dependable and Secure Computing, Vol. 15, No. 2, pp. 180-193, March 2018.https://doi.org/10.1109/TDSC.2016.2539942
  5. S. Rajarajan, K. Maheswari, R. Hemapriya, and S. Sriharilakshmi, "Shoulder Surfing Resistant Virtual Keyboard for Internet Banking", World Applied Sciences Journal, Vol. 31, No. 7, pp. 1297-1304, July 2014.
  6. T. Takada, "FakePointer: An Authentication Scheme for Improving Security against Peeping Attacks using Video Cameras", Proceedings of the Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, pp. 395-400, October 2008.https://doi.org/10.1109/UBICOMM.2008.76PMid:19102462
  7. E. Zezschwitz, A. Koslow, A. D. Luca, and H. Hussmann, "Making Graphic-Based Authentication Secure Against Smudge Attacks", Proceedings of the 2013 International Conference on Intelligent User Interfaces, pp. 277-286, March 2013.https://doi.org/10.1145/2449396.2449432
  8. E. Miluzzo, A. Varshavsky, S. Balakrishnan, and R. R. Choudhury, "TapPrints: Your Finger Taps Have Fingerprints", Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, pp. 323-336, June 2012.https://doi.org/10.1145/2307636.2307666
  9. https://post.naver.com/viewer/postView.nhn?volumeNo=16858179&memberNo=35797485&vType=VERTICAL
  10. https://cafe.naver.com/sangin4and6/7378
  11. S. Y. Kim, and T. K. Kwon, "User Authentication Method in Mobile Environment Usable Security Research Trend", Review of KIISC (Korea Institute of Information Security and Cryptology), Vol. 28, No. 1, pp. 22-28, February 2018.
  12. H. G. Lee, and Y. K. Kim, "Biomatrix Technology Trend Using Physical Characteristics", Commercializations Promotion Agency for R&D Outcomes, Vol. 63, October 2018.
  13. http://www.digitaltoday.co.kr/news/articleView.html?idxno=215333
  14. S. L. Yong, "Password-Based User Authentication Scheme Using a Dual-Display Method", Journal of the Korea Society of Computer and Information, Vol. 20, No. 1, pp. 119-125, March 2015.https://doi.org/10.9708/jksci.2015.20.1.119
  15. D. K. Tak, and D. M. Choi, "Image Information-Based Secure Keypad for Smart Devices", Asia-Pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol. 7, No. 2, pp. 289-299, February 2017.https://doi.org/10.14257/AJMAHS.2017.02.37
  16. D.K. Tak, and D.M. Choi, "Password Guessing Attack Resistant Circular Keypad for Smart Devices", Journal of Korea Multimedia Society, Vol. 19, No. 8, pp. 1395-1403, August 2016.https://doi.org/10.9717/kmms.2016.19.8.1395
  17. J. T. Seong, "Security Analysis of Partially Hidden Password Systems Resistant to Shoulder Surfing Attacks", Journal of Korea Institute of Information, Electronics, and Communication Technology, Vol. 13, No. 1, pp. 17-26, February 2020.
  18. D. M. Choi, "Application Adaptive Pattern-Based Authentication Method for Smartphones", Asia-Pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol. 8, No. 2, pp. 59-67, February 2018.
  19. https://news.joins.com/article/22774454
Information
  • Publisher :The Society of Convergence Knowledge
  • Publisher(Ko) :융복합지식학회
  • Journal Title :The Society of Convergence Knowledge Transactions
  • Journal Title(Ko) :융복합지식학회논문지
  • Volume : 9
  • No :4
  • Pages :1-11